HackDig : Dig high-quality web security articles for hacker

Egypt blocks dozens of websites including ‘Medium’ without any official announcement

The Egyptian government blocked a number of websites in Egypt, including the publishing platform Medium, without any official announcement. Egyptians users of the online publishing platform, Medium were not able to access the service from their country. Readers and bloggers using both desktop and mobile app suffered access problems, the reason of the blackou
Publish At:2017-06-12 13:15 | Read:602 | Comments:0 | Tags:Breaking News Digital ID Terrorism Censorship Egypt Medium p

4 Possible Ways to Make Your Browser Hacker-Proof

Browsers are constantly targeted by hackers. Here are 4 ways you can make your browser hacker-proof. Use them to stay secure on the web. Browsers have long been a hot target of numerous hacking-related incidents. They are the primary source of hacking incidents as we search, share, watch and download files from browsers. Moreover, various vulnerabilities exi
Publish At:2017-06-07 04:20 | Read:506 | Comments:0 | Tags:Breaking News Digital ID browser hacker-proof Hacking privac

Big Data Control Frameworks: Have Your Data and Control It Too

One of the fundamental requirements for big data users is big data control. Failure to properly store, audit and maintain data chain of custody undermines our individual and collective privacy. This failure also may be at odds with federal law and policy. Without data control, there is no data compliance. Fortunately, there is a host of big data analytics
Publish At:2017-06-01 11:15 | Read:639 | Comments:0 | Tags:Data Protection Identity & Access Big Data Big Data Analytic

Chrome design flaw allows sites to record Audio/Video without indication

A developer has discovered a flaw in the Chrome browser that could be exploited to secretly Record Audio/Video without indication. The AOL developer Ran Bar-Zik discovered a disconcerting vulnerability in Google’s Chrome browser could be exploited by attackers to record audio or video without giving any visual notification or alert. “After gettin
Publish At:2017-05-31 17:55 | Read:625 | Comments:0 | Tags:Breaking News Digital ID Hacking Chrome design flaw privacy

With Less Than 1 Year To Go Companies Place Different Priorities on GDPR Compliance

The European General Data Protection Regulation (GDPR) will take effect in one year from now, but a large number of firms are far from prepared. It feels like Y2K all over again. We are less than one year until the impact of the GDPR is realized, no one is certain what will happen, and everyone is taking a different approach to mitigation. In April 2016,
Publish At:2017-05-30 05:10 | Read:626 | Comments:0 | Tags:Breaking News Digital ID Laws and regulations GDPR Law priva

Goodbye Privacy? The US Has Recently Passed a Bill That Has Everyone Worried

 The US Congress  decided to repeal an Internet privacy regulation passed under the Obama administration. For many, this is unsettling news. Trump has already initialed the controversial repeal, which allows Internet providers to store and sell users’ browsing histories. The previous regulation, however, required these companies to obtain permission fr
Publish At:2017-05-26 18:50 | Read:759 | Comments:0 | Tags:Security companies data Internet Privacy

Fresh Phish. (So Many Puns, So Little Time.)

Today’s phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly mimics the invoice emails from a fairly sig
Publish At:2017-05-23 12:10 | Read:543 | Comments:0 | Tags:Threats apps attachments browsing files humans Isolation Mal

Who is listening? The problem of online microphones

What lurks in our microphones? Microphones play an important part in day-to-day life. We can talk with almost anyone in the world using our smartphones, tablets and laptops. We can even give our in-home smart technology instructions simply by speaking to it. But this power and convenience often means that microphones have to be left switched on – which means
Publish At:2017-05-17 13:40 | Read:613 | Comments:0 | Tags:Malware Mobile News cybersecurity Hackers Privacy

UK Government’s secret programme for mass surveillance on internet and phones leaked

According to a draft document leaked online, UK Government is assigning itself more powers to spy on live communications and use malware for surveillance. While the NSA is announcing it will stop surveillance activities on emails, texts, and other internet communications, the UK government has secretly drawn up more details of its new bulk surveillance power
Publish At:2017-05-07 10:15 | Read:597 | Comments:0 | Tags:Breaking News Digital ID Intelligence Laws and regulations e

Building a Holistic Cyberhealth Immune System

With the increased focus on the importance of cybersecurity in the health care industry, it is important to think of a more holistic approach to address the industry’s pain points when managing the massive amounts of data are generated at an incredible pace every day. This growing challenge calls for an immune system approach to security. According to
Publish At:2017-05-05 20:20 | Read:624 | Comments:0 | Tags:Data Protection Health Care Data Security Electronic Health

Information Security Practices of Aadhaar – 135 Million Indian government payment card details leaked

A CIS study estimated number of Aadhaar numbers leaked through 4 gov portals could be around 135 million and 100M bank account numbers. The Aadhaar is the world’s largest biometric ID system, with over 1.123 billion enrolled members as of 28 February 2017. The role of the system is crucial for both authenticating and authorizing transactions and is a pillar
Publish At:2017-05-03 14:15 | Read:523 | Comments:0 | Tags:Breaking News Data Breach Digital ID Aadhaar data breach dat

NSA announces it will stop surveillance activities on emails, texts and other internet communications

NSA announces a change in its surveillance activities, it will no longer spy on citizens’ emails, texts, and other Internet communications. It is official, the US NSA announced it will no longer spy on emails, texts and other internet communications that mention targets of surveillance.The NSA issued the official statement last week, announcing a histo
Publish At:2017-05-02 01:40 | Read:615 | Comments:0 | Tags:Breaking News Intelligence Hacking NSA PRISM privacy surveil

Four Essential Security & Privacy Extensions for Chrome

Here are the top four extensions for the Chrome browser to keep your online activity safe, secure and private. The recent global wave of cybercrimes, particularly via exploiting loopholes in many leading browsers, has put internet privacy and online security directly in the line of fire. Internet users, in general, are worried about securing their data again
Publish At:2017-04-27 02:15 | Read:669 | Comments:0 | Tags:Breaking News Digital ID Chrome extensions cyber security pr

A Backdoor to WhatsApp to Prevent Terrorism?

The recent tragedy in London has rekindled the debate surrounding privacy in the age of terrorism, specifically in the UK, where Home Secretary Amber Rudd is voicing harsh criticism of end-to-end encryption messaging services. It is believed that Khalid Masood, the terrorist responsible for the deaths of four people on Westminster Bridge, had connected to Wh
Publish At:2017-04-21 08:45 | Read:682 | Comments:0 | Tags:News end-to-end encryption Privacy WhatsApp

Exfiltrating data from laptop and smartphones via ambient light sensors

A security researcher presented a method to exfiltrate sensitive data from a laptop or a smartphone through built-in ambient light sensors. The security expert Lukasz Olejnik discovered that it is possible to steal sensitive data exploiting the ambient light sensors built-in many smartphones and laptops. The ambient light sensors are installed on electronic
Publish At:2017-04-20 23:00 | Read:851 | Comments:0 | Tags:Breaking News Digital ID Hacking ambient light sensors cyber


Share high-quality web security related articles with you:)


Tag Cloud